Read Ahead Material: Cover6 Solutions Virtual Workshops

Read Ahead | Cover6 Solutions Workshops

This guide prepares you for our #PentesterPrep & #SOCAnalystPrep
hands-on cybersecurity training.

First, we want to thank you for your interest in Cover6 Solutions. If you made it this far, that means you have most likely registered for one of our workshops. For that, we are forever grateful, and you will always be considered family to us.

This material summarizes the workshops, the hardware and software requirements, helpful videos, and education references to help you better understand the class content.

Use the tabs below to view the material for your desired workshop.

Workshop Read Ahead
Workshop Summaries

Today the demand for cybersecurity professionals has never been higher, and the need for skilled defensive (blue team) analysts is especially urgent. At Cover6 we will provide the training you need to find your place in cyber. We focus on the fundamentals of network defense through real-world, hands-on instruction, and our workshop will offer you a path to a successful career as a Security Operations Center (SOC) Analyst.

SOC Analysts are highly sought-after professionals who identify compromised machines and respond to malicious activity. They use defensive security skills and techniques while working to mitigate any damage that may have occurred.

Our Virtual SOC Analyst Prep Workshop offers a comprehensive introduction to defensive tactics, techniques, and procedures. Students will learn various strategies to help defend against several attack scenarios.

A few of the tools and technologies that participants will explore include; Security Onion, Wireshark, Splunk, and Nessus. Also, our course is designed to help you prepare for the CySA+ exam and reflects the current exam objectives.

In this workshop students will:

  • Analyze .pcap files and logs to identify Indicators of Compromise (IOC’s)
  • Perform various incident handling and response procedures
  • Use tools to implement initial threat hunting techniques
  • Be prepared to work in a SOC on day 1

Are you interested in learning the skills needed to test the defense of computers and networks around the world? Penetration testing or pentesting is one of the most challenging and rewarding areas of cybersecurity. At Cover6 Solutions, we do pentesting every day and we’re ready to share our knowledge with you if you’re ready to learn!

Welcome to our all-new Pentester Prep Workshop, where you’ll be exposed to the latest tools and technologies available for offensive cyber. Our intensive two-day workshop (Saturday & Sunday 9-5 PM ET) covers everything you need to get started in the red-hot field of pentesting.

You may be brand-new to cyber or maybe you already have some experience; either way, you will be getting your hands dirty and acquiring new skills to succeed in this high-demand field. That’s right, this is a very hands-on course and we have created challenging new labs and a brand-new virtual environment that will closely simulate actual pentesting engagements. We can’t wait for you to try it, we believe this will offer the most realistic pentesting training available today!

This workshop is tailored to prepare students to pass all major pentesting certification exams, including the CompTIA Pentest+, eJPT, and the CEH Practical. The only prerequisites for this workshop are curiosity and enthusiasm: you will need both!

The provided content is listed below as a guide for the course and is subject to change. We appreciate your support and hope that you enjoy the training. We look forward to your participation and feedback as well.  

If you have any additional questions outside of the FAQs, please do not hesitate to reach out to [email protected] and we will be happy to assist you. 

Course Outline 

This course is tailored to assist with the preparation for all offensive (practical) exams. It also includes the five primary exam objectives for the CompTIA Pentest+ Certification which are: 

  1. Planning and Scoping 
  2. Information Gathering and Vulnerability Identification 
  3. Attacks and Exploits 
  4. Penetration Testing Tools 
  5. Reporting and Communication 

Please note This is NOT an official CompTIA or CEH training class, but rather a preparation course for real scenarios you may encounter in pentesting engagements or on a certification exam. Various tools, techniques, and procedures will be covered during the sessions, so those listed in the syllabus above are just examples. This material is subject to change.


Helpful Videos to Prepare you for Class

Breaking into Cybersecurity w/ Tyrone E. Wilson

Home Lab Setup | Building an Effective Cybersecurity Learning Environment

Passive Information Gathering

Common Network Services, Threats & Attacks

Active Information Gathering

IPv6 Enumeration & Attacks

Understanding the Metasploit Database

Incident Handling & Threat Hunting w/ Security Onion: Gain Hands-On Cybersecurity Experience

Additional Educational References